GNU Linux-libre 4.19.207-gnu1
[releases.git] / drivers / staging / rtl8712 / ieee80211.c
1 /******************************************************************************
2  * ieee80211.c
3  *
4  * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
5  * Linux device driver for RTL8192SU
6  *
7  * This program is free software; you can redistribute it and/or modify it
8  * under the terms of version 2 of the GNU General Public License as
9  * published by the Free Software Foundation.
10  *
11  * This program is distributed in the hope that it will be useful, but WITHOUT
12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
14  * more details.
15  *
16  * Modifications for inclusion into the Linux staging tree are
17  * Copyright(c) 2010 Larry Finger. All rights reserved.
18  *
19  * Contact information:
20  * WLAN FAE <wlanfae@realtek.com>.
21  * Larry Finger <Larry.Finger@lwfinger.net>
22  *
23  ******************************************************************************/
24
25 #define _IEEE80211_C
26
27 #include "drv_types.h"
28 #include "ieee80211.h"
29 #include "wifi.h"
30 #include "osdep_service.h"
31 #include "wlan_bssdef.h"
32
33 static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1};
34 static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0};
35 static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1};
36 static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2};
37 static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4};
38 static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5};
39
40 static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0};
41 static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1};
42 static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2};
43 static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4};
44 static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5};
45
46 /*-----------------------------------------------------------
47  * for adhoc-master to generate ie and provide supported-rate to fw
48  *-----------------------------------------------------------
49  */
50
51 static u8 WIFI_CCKRATES[] =  {
52         (IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
53         (IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
54         (IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
55         (IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)
56 };
57
58 static u8 WIFI_OFDMRATES[] = {
59         (IEEE80211_OFDM_RATE_6MB),
60         (IEEE80211_OFDM_RATE_9MB),
61         (IEEE80211_OFDM_RATE_12MB),
62         (IEEE80211_OFDM_RATE_18MB),
63         (IEEE80211_OFDM_RATE_24MB),
64         (IEEE80211_OFDM_RATE_36MB),
65         (IEEE80211_OFDM_RATE_48MB),
66         (IEEE80211_OFDM_RATE_54MB)
67 };
68
69 uint r8712_is_cckrates_included(u8 *rate)
70 {
71         u32 i = 0;
72
73         while (rate[i] != 0) {
74                 if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) ||
75                     (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22))
76                         return true;
77                 i++;
78         }
79         return false;
80 }
81
82 uint r8712_is_cckratesonly_included(u8 *rate)
83 {
84         u32 i = 0;
85
86         while (rate[i] != 0) {
87                 if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) &&
88                     (((rate[i]) & 0x7f) != 11)  && (((rate[i]) & 0x7f) != 22))
89                         return false;
90                 i++;
91         }
92         return true;
93 }
94
95 /* r8712_set_ie will update frame length */
96 u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen)
97 {
98         *pbuf = (u8)index;
99         *(pbuf + 1) = (u8)len;
100         if (len > 0)
101                 memcpy((void *)(pbuf + 2), (void *)source, len);
102         *frlen = *frlen + (len + 2);
103         return pbuf + len + 2;
104 }
105
106 /* ---------------------------------------------------------------------------
107  * index: the information element id index, limit is the limit for search
108  * ---------------------------------------------------------------------------
109  */
110 u8 *r8712_get_ie(u8 *pbuf, sint index, uint *len, sint limit)
111 {
112         sint tmp, i;
113         u8 *p;
114
115         if (limit < 1)
116                 return NULL;
117         p = pbuf;
118         i = 0;
119         *len = 0;
120         while (1) {
121                 if (*p == index) {
122                         *len = *(p + 1);
123                         return p;
124                 }
125                 tmp = *(p + 1);
126                 p += (tmp + 2);
127                 i += (tmp + 2);
128                 if (i >= limit)
129                         break;
130         }
131         return NULL;
132 }
133
134 static void set_supported_rate(u8 *rates, uint mode)
135 {
136         memset(rates, 0, NDIS_802_11_LENGTH_RATES_EX);
137         switch (mode) {
138         case WIRELESS_11B:
139                 memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
140                 break;
141         case WIRELESS_11G:
142         case WIRELESS_11A:
143                 memcpy(rates, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
144                 break;
145         case WIRELESS_11BG:
146                 memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
147                 memcpy(rates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES,
148                        IEEE80211_NUM_OFDM_RATESLEN);
149                 break;
150         }
151 }
152
153 static uint r8712_get_rateset_len(u8 *rateset)
154 {
155         uint i = 0;
156
157         while (1) {
158                 if ((rateset[i]) == 0)
159                         break;
160                 if (i > 12)
161                         break;
162                 i++;
163         }
164         return i;
165 }
166
167 int r8712_generate_ie(struct registry_priv *pregistrypriv)
168 {
169         int rate_len;
170         uint sz = 0;
171         struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network;
172         u8 *ie = pdev_network->IEs;
173         u16 beaconPeriod = (u16)pdev_network->Configuration.BeaconPeriod;
174
175         /*timestamp will be inserted by hardware*/
176         sz += 8;
177         ie += sz;
178         /*beacon interval : 2bytes*/
179         *(__le16 *)ie = cpu_to_le16(beaconPeriod);
180         sz += 2;
181         ie += 2;
182         /*capability info*/
183         *(u16 *)ie = 0;
184         *(__le16 *)ie |= cpu_to_le16(cap_IBSS);
185         if (pregistrypriv->preamble == PREAMBLE_SHORT)
186                 *(__le16 *)ie |= cpu_to_le16(cap_ShortPremble);
187         if (pdev_network->Privacy)
188                 *(__le16 *)ie |= cpu_to_le16(cap_Privacy);
189         sz += 2;
190         ie += 2;
191         /*SSID*/
192         ie = r8712_set_ie(ie, _SSID_IE_, pdev_network->Ssid.SsidLength,
193                           pdev_network->Ssid.Ssid, &sz);
194         /*supported rates*/
195         set_supported_rate(pdev_network->rates, pregistrypriv->wireless_mode);
196         rate_len = r8712_get_rateset_len(pdev_network->rates);
197         if (rate_len > 8) {
198                 ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 8,
199                                   pdev_network->rates, &sz);
200                 ie = r8712_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rate_len - 8),
201                                   (pdev_network->rates + 8), &sz);
202         } else {
203                 ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_,
204                                   rate_len, pdev_network->rates, &sz);
205         }
206         /*DS parameter set*/
207         ie = r8712_set_ie(ie, _DSSET_IE_, 1,
208                           (u8 *)&pdev_network->Configuration.DSConfig, &sz);
209         /*IBSS Parameter Set*/
210         ie = r8712_set_ie(ie, _IBSS_PARA_IE_, 2,
211                           (u8 *)&pdev_network->Configuration.ATIMWindow, &sz);
212         return sz;
213 }
214
215 unsigned char *r8712_get_wpa_ie(unsigned char *pie, uint *wpa_ie_len, int limit)
216 {
217         u32 len;
218         u16 val16;
219         unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
220         u8 *pbuf = pie;
221
222         while (1) {
223                 pbuf = r8712_get_ie(pbuf, _WPA_IE_ID_, &len, limit);
224                 if (pbuf) {
225                         /*check if oui matches...*/
226                         if (memcmp((pbuf + 2), wpa_oui_type,
227                                    sizeof(wpa_oui_type)))
228                                 goto check_next_ie;
229                         /*check version...*/
230                         memcpy((u8 *)&val16, (pbuf + 6), sizeof(val16));
231                         le16_to_cpus(&val16);
232                         if (val16 != 0x0001)
233                                 goto check_next_ie;
234                         *wpa_ie_len = *(pbuf + 1);
235                         return pbuf;
236                 }
237                 *wpa_ie_len = 0;
238                 return NULL;
239 check_next_ie:
240                 limit = limit - (pbuf - pie) - 2 - len;
241                 if (limit <= 0)
242                         break;
243                 pbuf += (2 + len);
244         }
245         *wpa_ie_len = 0;
246         return NULL;
247 }
248
249 unsigned char *r8712_get_wpa2_ie(unsigned char *pie, uint *rsn_ie_len, int limit)
250 {
251         return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit);
252 }
253
254 static int r8712_get_wpa_cipher_suite(u8 *s)
255 {
256         if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN))
257                 return WPA_CIPHER_NONE;
258         if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN))
259                 return WPA_CIPHER_WEP40;
260         if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN))
261                 return WPA_CIPHER_TKIP;
262         if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN))
263                 return WPA_CIPHER_CCMP;
264         if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN))
265                 return WPA_CIPHER_WEP104;
266         return 0;
267 }
268
269 static int r8712_get_wpa2_cipher_suite(u8 *s)
270 {
271         if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN))
272                 return WPA_CIPHER_NONE;
273         if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN))
274                 return WPA_CIPHER_WEP40;
275         if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN))
276                 return WPA_CIPHER_TKIP;
277         if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN))
278                 return WPA_CIPHER_CCMP;
279         if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN))
280                 return WPA_CIPHER_WEP104;
281         return 0;
282 }
283
284 int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher,
285                        int *pairwise_cipher)
286 {
287         int i;
288         int left, count;
289         u8 *pos;
290
291         if (wpa_ie_len <= 0) {
292                 /* No WPA IE - fail silently */
293                 return _FAIL;
294         }
295         if ((*wpa_ie != _WPA_IE_ID_) ||
296             (*(wpa_ie + 1) != (u8)(wpa_ie_len - 2)) ||
297             (memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN)))
298                 return _FAIL;
299         pos = wpa_ie;
300         pos += 8;
301         left = wpa_ie_len - 8;
302         /*group_cipher*/
303         if (left >= WPA_SELECTOR_LEN) {
304                 *group_cipher = r8712_get_wpa_cipher_suite(pos);
305                 pos += WPA_SELECTOR_LEN;
306                 left -= WPA_SELECTOR_LEN;
307         } else if (left > 0) {
308                 return _FAIL;
309         }
310         /*pairwise_cipher*/
311         if (left >= 2) {
312                 count = le16_to_cpu(*(__le16 *)pos);
313                 pos += 2;
314                 left -= 2;
315                 if (count == 0 || left < count * WPA_SELECTOR_LEN)
316                         return _FAIL;
317                 for (i = 0; i < count; i++) {
318                         *pairwise_cipher |= r8712_get_wpa_cipher_suite(pos);
319                         pos += WPA_SELECTOR_LEN;
320                         left -= WPA_SELECTOR_LEN;
321                 }
322         } else if (left == 1) {
323                 return _FAIL;
324         }
325         return _SUCCESS;
326 }
327
328 int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher,
329                         int *pairwise_cipher)
330 {
331         int i;
332         int left, count;
333         u8 *pos;
334
335         if (rsn_ie_len <= 0) {
336                 /* No RSN IE - fail silently */
337                 return _FAIL;
338         }
339         if ((*rsn_ie != _WPA2_IE_ID_) ||
340             (*(rsn_ie + 1) != (u8)(rsn_ie_len - 2)))
341                 return _FAIL;
342         pos = rsn_ie;
343         pos += 4;
344         left = rsn_ie_len - 4;
345         /*group_cipher*/
346         if (left >= RSN_SELECTOR_LEN) {
347                 *group_cipher = r8712_get_wpa2_cipher_suite(pos);
348                 pos += RSN_SELECTOR_LEN;
349                 left -= RSN_SELECTOR_LEN;
350         } else if (left > 0) {
351                 return _FAIL;
352         }
353         /*pairwise_cipher*/
354         if (left >= 2) {
355                 count = le16_to_cpu(*(__le16 *)pos);
356                 pos += 2;
357                 left -= 2;
358                 if (count == 0 || left < count * RSN_SELECTOR_LEN)
359                         return _FAIL;
360                 for (i = 0; i < count; i++) {
361                         *pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos);
362                         pos += RSN_SELECTOR_LEN;
363                         left -= RSN_SELECTOR_LEN;
364                 }
365         } else if (left == 1) {
366                 return _FAIL;
367         }
368         return _SUCCESS;
369 }
370
371 int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len,
372                      u8 *wpa_ie, u16 *wpa_len)
373 {
374         u8 authmode;
375         u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
376         uint cnt;
377
378         /*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/
379         cnt = _TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_;
380         while (cnt < in_len) {
381                 authmode = in_ie[cnt];
382                 if ((authmode == _WPA_IE_ID_) &&
383                     (!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) {
384                         memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
385                         *wpa_len = in_ie[cnt + 1] + 2;
386                         cnt += in_ie[cnt + 1] + 2;  /*get next */
387                 } else {
388                         if (authmode == _WPA2_IE_ID_) {
389                                 memcpy(rsn_ie, &in_ie[cnt],
390                                        in_ie[cnt + 1] + 2);
391                                 *rsn_len = in_ie[cnt + 1] + 2;
392                                 cnt += in_ie[cnt + 1] + 2;  /*get next*/
393                         } else {
394                                 cnt += in_ie[cnt + 1] + 2;   /*get next*/
395                         }
396                 }
397         }
398         return *rsn_len + *wpa_len;
399 }
400
401 int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
402 {
403         int match;
404         uint cnt;
405         u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
406
407         cnt = 12;
408         match = false;
409         while (cnt < in_len) {
410                 eid = in_ie[cnt];
411                 if ((eid == _WPA_IE_ID_) &&
412                     (!memcmp(&in_ie[cnt + 2], wps_oui, 4))) {
413                         memcpy(wps_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
414                         *wps_ielen = in_ie[cnt + 1] + 2;
415                         cnt += in_ie[cnt + 1] + 2;
416                         match = true;
417                         break;
418                 }
419                         cnt += in_ie[cnt + 1] + 2; /* goto next */
420         }
421         return match;
422 }